Security Evaluation for Graphical Password

被引:0
|
作者
Lashkari, Arash Habibi [1 ]
Manaf, Azizah Abdul [1 ]
Masrom, Maslin [2 ]
Daud, Salwani Mohd [1 ]
机构
[1] Univ Technol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Techn Malaysia, Razak Sch Engn & Adv Techn, George Town, Malaysia
关键词
Pure Recall-Based GUA; Cued Recall-Based GUA; Recognition Based GUA; Graphical Password; Security; Attack Patterns; Brute force; Dictionary attack; Guessing Attack; Spyware; Shoulder surfing; Social engineering Attack; Password Entropy; Password Space;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical Password or Graphical user authentication (GUA) has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. All of Graphical Password algorithms have two different aspects which are usability and security. This paper focuses on security aspects of algorithms that most of researchers work on this part and try to define security features and attributes. Unfortunately, till now there isn't a complete evaluation criterion for graphical password security. At first, this paper tries to study on most of GUA algorithm. Then, collects the major security attributes in GUA and proposed an evaluation criterion.
引用
收藏
页码:431 / +
页数:3
相关论文
共 50 条
  • [31] A Deep Learning-Based Password Security Evaluation Model
    Hong, Ki Hyeon
    Lee, Byung Mun
    APPLIED SCIENCES-BASEL, 2022, 12 (05):
  • [32] A STUDY OF PASSWORD SECURITY
    LUBY, M
    RACKOFF, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 392 - 397
  • [33] Cheap Password Security
    Curley, B.
    Digital Systems Journal, 172 (2-3):
  • [34] PASSWORD SECURITY MEASURES
    DAVID, J
    COMMUNICATIONS OF THE ACM, 1994, 37 (06) : 11 - 11
  • [35] Password Security: Password Behavior Analysis at a Small University
    Awad, Mohammed
    Al-Qudah, Zakaria
    Idwan, Sahar
    Jallad, Abdul Halim
    2016 5TH INTERNATIONAL CONFERENCE ON ELECTRONIC DEVICES, SYSTEMS AND APPLICATIONS (ICEDSA), 2016,
  • [36] Graphical Passwords: A Qualitative Study of Password Patterns
    Vorster, Jo
    van Heerden, Renier
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 375 - 383
  • [37] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [38] Sequential Graphical Password Framework for Mobile Devices
    Hui, Liew Tze
    Bashier, Housam Khalifa
    Hoe, Lau Siong
    Kwee, Wee Kouk
    Abdullah, Mohd Fikri Azli
    2014 4th World Congress on Information and Communication Technologies (WICT), 2014, : 194 - 198
  • [39] A Systematic Literature Review of Graphical Password Schemes
    Shammee T.I.
    Akter T.
    Mou M.
    Chowdhury F.
    Ferdous M.S.
    Chowdhury, Farida (farida-cse@sust.edu), 1600, Korean Institute of Information Scientists and Engineers (16): : 163 - 185
  • [40] Token-based graphical password authentication
    Gyorffy, John Charles
    Tappenden, Andrew F.
    Miller, James
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 321 - 336